Автор: John Sammons Название: The Basics of Cyber Safety ISBN: 0124166504 ISBN-13(EAN): 9780124166509 Издательство: Elsevier Science Рейтинг: Цена: 29190.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.
Автор: Tewari, Aakanksha Gupta, Brij B. (director, International Center For Ai And Cyber Security Research And Innovations & Full Professor Of Department Of Название: Routledge international handbook of universities, security and intelligence studies ISBN: 1032401133 ISBN-13(EAN): 9781032401133 Издательство: Taylor&Francis Рейтинг: Цена: 45930.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics
Автор: Bochman Andrew A., Freeman Sarah Название: Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) ISBN: 0367673711 ISBN-13(EAN): 9780367673710 Издательство: Taylor&Francis Рейтинг: Цена: 33670.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The book introduces a new methodology to help critical infrastructure owners, operators, and security practitioners make demonstrable improvements to secure the most important functions and processes. It provides practical techniques to put targets beyond the reach of the most persisent cyber adversaries.
Do you feel that informatics is indispensable in today's increasingly digital world? Do you want to introduce yourself to the world of programming or cyber security but don't know where to get started? If the answer to these questions is yes, then keep reading...
This book includes:
PYTHON MACHINE LEARNING: A Beginner's Guide to Python Programming for Machine Learning and Deep Learning, Data Analysis, Algorithms and Data Science with Scikit Learn, TensorFlow, PyTorch and Keras
Here's a sneak peek of what you'll learn with this book:
- The Fundamentals of Python
- Python for Machine Learning
- Data Analysis in Python
- Comparing Deep Learning and Machine Learning
- The Role of Machine Learning in the Internet of Things (IoT)
And much more...
SQL FOR BEGINNERS: A Step by Step Guide to Learn SQL Programming for Query Performance Tuning on SQL Database
Throughout these pages, you will learn:
- How to build databases and tables with the data you create.
- How to sort through the data efficiently to find what you need.
- The exact steps to clean your data and make it easier to analyze.
- How to modify and delete tables and databases.
And much more...
LINUX FOR BEGINNERS: An Introduction to the Linux Operating System for Installation, Configuration and Command Line
We will cover the following topics:
- How to Install Linux
- The Linux Console
- Command line interface
- Network administration
And much more...
HACKING WITH KALI LINUX: A Beginner's Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security
You will learn:
- The importance of cybersecurity
- How malware and cyber-attacks operate
- How to install Kali Linux on a virtual box
- VPNs & Firewalls
And much more...
ETHICAL HACKING: A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment
Here's a sneak peek of what you'll learn with this book:
- What is Ethical Hacking (roles and responsibilities of an Ethical Hacker)
- Most common security tools
- The three ways to scan your system
- The seven proven penetration testing strategies
...and much more.
This book won't make you an expert programmer, but it will give you an exciting first look at programming and a foundation of basic concepts with which you can start your journey learning computer programming, machine learning and cybersecurity
Buy it NOW and let your customers get addicted to this amazing book
Автор: Kaschner Holger Название: Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication ISBN: 3658354887 ISBN-13(EAN): 9783658354886 Издательство: Springer Рейтинг: Цена: 69870.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: With numerous illustrations and checklists.This book is a translation of the original German 1st edition Cyber Crisis Management by Holger Kaschner, published by Springer Fachmedien Wiesbaden GmbH, part of Springer Nature in 2020.
Автор: Sweetman Название: Cyber and the City ISBN: 3031079329 ISBN-13(EAN): 9783031079320 Издательство: Springer Рейтинг: Цена: 32600.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commonly understood. Ever since the major London banks purchased their first computers in the early 1960s, they have had to balance their dependence on those machines with the need to secure their operations and retain the trust of their customers. Technological change in the second half of the 20th century prompted British banks to reevaluate their function as trusted protectors of wealth. In the City of London, the capital’s oldest area and historically its business and commerce hub, the colossal clearing banks employed newly commercialised electronic computers—the processing power of which could transform the highly clerical clearing and settlement process. What unfolded over the following three decades was a relentless modernisation drive. Revolutionising the way that banks and other financial institutions conducted business and interacted with each other and permanently altering the speed and scale at which the United Kingdom’s financial sector functioned, this rapid modernisation thrust computer security into the consciousness of bank executives and their clients alike. Dependence on computers quickly grew, and the banks immediately realised the need to secure their new software and hardware. Focusing on the period 1960 to 1990, this book uses newly released and previously unexplored archival material to trace the origins of cyber security in the UK financial sector. Topics and features: * Describes how institutions managed the evolving challenge of computer security in the second half of the 20th century Demonstrates continuity in banks' views of security through the prism of confidentiality, integrity and availability, and the concept of resilience * Presents case studies of bank collaboration on computer security through creation of payment systems like SWIFT and CHAPS Outlines the shift from focusing on physical security measures to technical network-protection measures * Explores the relationship between banks and the UK Government as bank operations became dependent on computer and network technology This work will be of value to students and academic researchers in the history of computing, financial history, and the history of intelligence and security, as well as the general reader interested in contemporary intelligence, cyber security, and finance.
Автор: Omar Название: Defending Cyber Systems through Reverse Engineering of Criminal Malware ISBN: 3031116259 ISBN-13(EAN): 9783031116254 Издательство: Springer Рейтинг: Цена: 37260.00 T Наличие на складе: Невозможна поставка. Описание: This SpringerBrief discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowledge and skills necessary to take control of cyberattacks. This SpringerBrief explores key tools and techniques to learn the main elements of malware analysis from the inside out. It also presents malware reverse engineering using several methodical phases, in order to gain a window into the mind set of hackers. Furthermore, this brief examines malicious program’s behavior and views its code-level patterns. Real world malware specimens are used to demonstrate the emerging behavioral patterns of battlefield malware as well. This SpringerBrief is unique, because it demonstrates the capabilities of emerging malware by conducting reverse-code engineering on real malware samples and conducting behavioral analysis in isolated lab system. Specifically, the author focuses on analyzing malicious Windows executables. This type of malware poses a large threat to modern enterprises. Attackers often deploy malicious documents and browser-based exploits to attack Windows enterprise environment. Readers learn how to take malware inside-out using static properties analysis, behavioral analysis and code-level analysis techniques. The primary audience for this SpringerBrief is undergraduate students studying cybersecurity and researchers working in this field. Cyber security professionals that desire to learn more about malware analysis tools and techniques will also want to purchase this SpringerBrief.
How do I secure my computer? What is malware and how do I get rid of it? Do I only need to worry about Phishing attacks via email? What if my personal email account, bank account, or other accounts were compromised? Sounds familiar? Keep reading...
Cybersecurity has changed significantly in the past decade, we've moved away from the days when basic virus protection and security controls were sufficient to deter threats, to the need for advanced security analytics tools to prevent advanced persistent threats (APTs) and tackle malicious insiders.
This book includes:
Hacking with Kali Linux: A Beginner's Guide to Learn Penetration Testing to Protect Your Family and Business from Cyber Attacks Building a Home Security System for Wireless Network Security
Here's a sneak peek of what you'll learn with this book:
- What is hacking
- The importance of cybersecurity
- How malware and cyber-attacks operate
- How to install Kali Linux on a virtual box
- How to scan networks
- VPNs & Firewalls
- An introduction to Digital Signatures and Cryptography
- and much more...
Ethical Hacking: A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment
Throughout these pages, you will learn:
- Roles and responsibilities of an Ethical Hacker
- Hacking as a career
- Making money freelance
- Most common security tools
- The three ways to scan your system
- The seven proven penetration testing strategies
- and much more...
Even if you aren't a security expert, there are a few basic steps you can take to secure your computer.
Arm yourself with all this knowledge
Buy it NOW and let your customers get addicted to this amazing book
Автор: Jenkinson Andrew Название: Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare ISBN: 1032068493 ISBN-13(EAN): 9781032068497 Издательство: Taylor&Francis Рейтинг: Цена: 112290.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book covers decades of digital eavesdropping and manipulation of agencies to Stuxnet, the world`s first use of digital code and digital certificates for offensive purposes against the Iranians and their Nuclear Power facilities to cause collateral damage. It continues all the way to today`s Solarwinds attack, codenamed Sunburst.
Автор: Balusamy Suresh, Dudin Alexander N., Graсa Manuel Название: Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation: 4th International C ISBN: 9811596999 ISBN-13(EAN): 9789811596995 Издательство: Springer Цена: 46570.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2019, which was held in Coimbatore, India, in December 2019. They were organized in topical sections named: computational intelligence; and computational models.
Название: Cyber-security threats, actors, and dynamic mitigation ISBN: 0367433311 ISBN-13(EAN): 9780367433314 Издательство: Taylor&Francis Рейтинг: Цена: 122490.00 T Наличие на складе: Невозможна поставка. Описание: Cyber-security and its related threats change constantly. The book aims at using practical contemporary machine learning-based techniques for detecting everyday threats such as, malware and dynamic risk analysis on attack graphs to determine how vulnerable the system is and what security measures are needed.
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz